UAE issues warning over WhatsApp zero‑day attack exploiting calls

According to the council, this flaw allows attackers to gain access to sensitive personal data, including photos, messages and account authentication tokens.

WhatsApp zero‑day attack

The UAE Cybersecurity Council has issued an urgent warning about a sophisticated zero‑day vulnerability in WhatsApp that enables hackers to compromise smartphones simply by placing a call from an unfamiliar number — even if the user does not answer.
According to the council, this flaw allows attackers to gain access to sensitive personal data, including photos, messages and account authentication tokens. The attack exploits a previously unknown weakness in WhatsApp’s call processing, meaning developers had no prior patch available when the threat emerged.
To help users protect themselves, the council recommends these key actions: block unknown incoming calls, enable two‑step verification on WhatsApp, keep the app updated at all times, avoid clicking suspicious links, install trusted security applications, and verify information from official sources only.
The agency emphasises that users in government and critical‐sector roles should especially steer clear of using personal devices for highly sensitive communications, and should ensure security settings are aligned with best‑practice policies.

Read Also  US-India 10-Year Defence Pact Strengthens Indo-Pacific Security

Gulf Repost stands as one of the most reliable news portals in the UAE, bringing you the latest Gulf news and updates. We cover the biggest stories from Dubai, Abu Dhabi, Riyadh, Doha, and beyond, focusing on business, innovation, government, and community news.

Layla Hassan

Layla Hassan

Layla covers lifestyle, travel, food, and culture. Her engaging features inspire readers to explore new experiences.

Subscribe to Our Newsletter

Keep in touch with our news & offers

Thank you for subscribing to the newsletter.

Oops. Something went wrong. Please try again later.

Leave a Reply

Your email address will not be published. Required fields are marked *